In most organizations, the only thought given to SELinux is remembering to turn it off when installing new systems. And yet as I respond to intrusion after intrusion on Linux systems, I know that most of them would never have happened had SELinux been properly deployed.
SELinux has been hampered by a suspicious pedigree (“It comes from the NSA—fear it!”) and a horrible initial roll-out (“This breaks everything—kill it with fire!”). But largely the issue is that the SELinux universe stands outside the normal Linux security model and troubleshooting strategy. Things break in mysterious ways when you enable SELinux, and the fixes are not obvious.
This two-part, hands-on course attempts to break down some of the barriers to SELinux adoption in your organization. Part One focuses on a high-speed introduction to SELinux and a troubleshooting strategy to help you diagnose and correct issues due to SELinux. Part Two gets into the guts of SELinux and provides guidance on developing SELinux policies for new services.
Students will learn basic commands for interacting with the SELinux universe as well as how to:
- Troubleshoot system issues where SELinux is enabled
- Correct issues so your applications can work safely with SELinux
- Extend the default SELinux policy to work with new applications
WHO SHOULD TAKE THIS COURSE
- Linux SREs and System Admins
- Security Engineers/Architects
- Linux Developers/DevOps
- SOC Analysts, Incident Responders
AUDIENCE SKILL LEVEL
Experience with Linux and the Linux command-line is preferred. No experience with SELinux is necessary or assumed.
Students should be comfortable working with the Linux command line.
WHAT EACH STUDENT SHOULD BRING
- High-speed Internet access
- A BitTorrent client for downloading course materials (e.g., Transmission)
- A computer with at least 150GB of free space and capable of running a 64-bit VMware virtual machine using 4GB of RAM
WHAT STUDENTS WILL BE PROVIDED WITH
Students will receive course slides, author notes, lab exercises and virtual machine, all via electronic download.
Learn via live stream from instructors that are in the field utilizing the techniques they teach. Classes are split into four training days that are each four hours long. Live Online training includes six months access to dedicated class channels in the Antisyphon Discord server, six months access to live class recordings, a certificate of participation, and 12 months complimentary access to the Antisyphon Cyber Range.
Learn at your own pace with access to course content, lectures, and demos in the Antisyphon On-demand learning platform. Most courses are offered with lifetime access to the course and content updates. All On-demand courses include content update alerts, access to dedicated support channels in the Antisyphon Discord server, a certificate of participation, and 12 months complimentary access to the Antisyphon Cyber Range.
Live Online w/ On-Demand Bundle
This is the best of both worlds! Attend the live online class at its next scheduled interval and gain access to the online training modules in the Antisyphon On-demand training platform. Bundle also includes six months access to dedicated class channels in the Antisyphon Discord server, six months access to live class recordings, a certificate of participation, and 12 months complimentary access to the Antisyphon Cyber Range.
TRAINER & AUTHOR
Hal Pomeranz has spent more than thirty years providing pragmatic Information Technology and Security solutions for some of the world’s largest commercial, government, and academic institutions. He is a frequent presenter at national and local technical gatherings and the author of numerous books and articles in the field of Information Security and Digital Forensics.